ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Unmasking the Iranian APT COBALT MIRAGE

Автор: SANS Digital Forensics and Incident Response

Загружено: 2023-04-03

Просмотров: 7479

Описание: SANS Cyber Threat Intelligence Summit 2023

Unmasking the Iranian APT COBALT MIRAGE
Lina Lau, Principal Incident ResponseConsultant - APJ South, Secureworks

From operational security failures to a Department of Justice (DOJ) indictment, COBALT MIRAGE likes to blur the lines between espionage and revenue generation. This talk uncovers the tactics, techniques and procedures deployed by COBALT MIRAGE from incidents worked at Secureworks. It's not often white hats see operational security failures unmask the identity of the adversary and even rarer to see it reflected in a DOJ sentencing. Attendees will learn about the critical role of contractor organizations in Iranian APT groups, crossovers in tooling between APT groups, techniques leveraged by COBALT MIRAGE to compromise organisations, inconsistencies in techniques, and the use of post-exploitation ransomware to generate company-specific revenue. Attendees will walk away with a stronger understanding of Iranian APT motivations, organizational structure, and sophistication.

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Unmasking the Iranian APT COBALT MIRAGE

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Lessons Learned From Over a Decade in OSINT

Lessons Learned From Over a Decade in OSINT

Deconstructing the Analyst Mindset

Deconstructing the Analyst Mindset

Inside the Persistent Mind of a Chinese Nation-State Actor

Inside the Persistent Mind of a Chinese Nation-State Actor

Are Hackers the Biggest Threat to American Infrastructure? | Vice News

Are Hackers the Biggest Threat to American Infrastructure? | Vice News

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Keynote: Cobalt Strike Threat Hunting | Chad Tilbury

Zero to CTI: A Novice’s Journey into Threat Intelligence

Zero to CTI: A Novice’s Journey into Threat Intelligence

CrikeyCon 2022 - Lina Lau - Inside the Persistent Mind of a Chinese APT

CrikeyCon 2022 - Lina Lau - Inside the Persistent Mind of a Chinese APT

"APT Attack Techniques in Azure Cloud" by Lina Lau, BSides Canberra 2023

AI-Powered Ransomware: How Threat Actors Weaponize AI Across the Attack Lifecycle

AI-Powered Ransomware: How Threat Actors Weaponize AI Across the Attack Lifecycle

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

The Hack That Made China a Superpower: Operation Shady Rat

The Hack That Made China a Superpower: Operation Shady Rat

Fast Forensics and Threat Hunting with Yamato Security Tools

Fast Forensics and Threat Hunting with Yamato Security Tools

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Investigating links between Iranian hacktivists and nation state groups - Rhianna King (SecAlliance)

Investigating links between Iranian hacktivists and nation state groups - Rhianna King (SecAlliance)

How to Use CTI, No Matter the Size of Your Organization

How to Use CTI, No Matter the Size of Your Organization

Investigating WMI Attacks

Investigating WMI Attacks

Использование OSINT для отслеживания лиц, создающих киберугрозы

Использование OSINT для отслеживания лиц, создающих киберугрозы

What Does an LLM-Powered Threat Intelligence Program Look Like?

What Does an LLM-Powered Threat Intelligence Program Look Like?

Common misconceptions and mistakes made in Threat Hunting

Common misconceptions and mistakes made in Threat Hunting

Detect Hackers & Malware on your Computer (literally for free)

Detect Hackers & Malware on your Computer (literally for free)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]